咨询与建议

限定检索结果

文献类型

  • 15,677 篇 会议
  • 9,971 篇 期刊文献
  • 447 册 图书

馆藏范围

  • 26,095 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15,259 篇 工学
    • 9,638 篇 计算机科学与技术...
    • 7,742 篇 软件工程
    • 3,231 篇 信息与通信工程
    • 3,053 篇 控制科学与工程
    • 2,081 篇 电气工程
    • 1,820 篇 电子科学与技术(可...
    • 1,658 篇 生物工程
    • 1,310 篇 机械工程
    • 1,303 篇 生物医学工程(可授...
    • 995 篇 光学工程
    • 810 篇 动力工程及工程热...
    • 798 篇 仪器科学与技术
    • 705 篇 化学工程与技术
    • 610 篇 材料科学与工程(可...
    • 557 篇 安全科学与工程
    • 542 篇 交通运输工程
  • 8,748 篇 理学
    • 4,511 篇 数学
    • 2,311 篇 物理学
    • 1,977 篇 生物学
    • 1,541 篇 统计学(可授理学、...
    • 1,463 篇 系统科学
    • 814 篇 化学
  • 3,828 篇 管理学
    • 2,532 篇 管理科学与工程(可...
    • 1,423 篇 图书情报与档案管...
    • 1,296 篇 工商管理
  • 1,384 篇 医学
    • 1,158 篇 临床医学
    • 979 篇 基础医学(可授医学...
    • 565 篇 药学(可授医学、理...
    • 518 篇 公共卫生与预防医...
  • 709 篇 法学
    • 584 篇 社会学
  • 459 篇 经济学
  • 316 篇 教育学
  • 276 篇 农学
  • 70 篇 文学
  • 54 篇 军事学
  • 40 篇 艺术学
  • 7 篇 哲学
  • 3 篇 历史学

主题

  • 1,114 篇 computer science
  • 482 篇 deep learning
  • 356 篇 systems engineer...
  • 341 篇 computational mo...
  • 331 篇 machine learning
  • 318 篇 application soft...
  • 318 篇 artificial intel...
  • 290 篇 computer archite...
  • 264 篇 control systems
  • 260 篇 internet of thin...
  • 235 篇 support vector m...
  • 232 篇 feature extracti...
  • 224 篇 accuracy
  • 217 篇 optimization
  • 209 篇 neural networks
  • 208 篇 software enginee...
  • 198 篇 information syst...
  • 194 篇 training
  • 193 篇 laboratories
  • 184 篇 routing

机构

  • 55 篇 shanghai key lab...
  • 46 篇 department of la...
  • 46 篇 department of el...
  • 44 篇 department of co...
  • 44 篇 department of sy...
  • 42 篇 department of el...
  • 42 篇 department of sy...
  • 42 篇 department of el...
  • 39 篇 department of co...
  • 39 篇 department of in...
  • 37 篇 department of co...
  • 35 篇 department of el...
  • 34 篇 department of co...
  • 33 篇 department of co...
  • 33 篇 school of comput...
  • 32 篇 department of co...
  • 31 篇 academy of mathe...
  • 30 篇 department of co...
  • 27 篇 department of co...
  • 27 篇 department of co...

作者

  • 93 篇 niyato dusit
  • 55 篇 rajkumar buyya
  • 52 篇 hisao ishibuchi
  • 43 篇 m. zahn
  • 41 篇 e. rogers
  • 40 篇 bernhard schölko...
  • 34 篇 abdelwahed motwa...
  • 33 篇 sofotasios pasch...
  • 28 篇 hong choong seon
  • 26 篇 jiang liu
  • 25 篇 el-sayed m.el-ke...
  • 25 篇 shen xuemin
  • 24 篇 liu jiaming
  • 23 篇 tao yang
  • 23 篇 j.h. lang
  • 22 篇 soni mukesh
  • 20 篇 liu xin
  • 20 篇 lin iuon-chang
  • 19 篇 ferrara antonell...
  • 19 篇 lindemann lars

语言

  • 24,565 篇 英文
  • 1,274 篇 其他
  • 224 篇 中文
  • 32 篇 日文
  • 7 篇 德文
  • 3 篇 法文
  • 2 篇 朝鲜文
  • 2 篇 斯洛文尼亚文
  • 1 篇 西班牙文
  • 1 篇 荷兰文
  • 1 篇 俄文
检索条件"机构=Department of Computer Systems Engineering and Science"
26095 条 记 录,以下是591-600 订阅
排序:
Automatic Detection of Weapons in Surveillance Cameras Using Efficient-Net
收藏 引用
computers, Materials & Continua 2022年 第9期72卷 4615-4630页
作者: Erssa Arif Syed Khuram Shahzad Muhammad Waseem Iqbal Muhammad Arfan Jaffar Abdullah S.Alshahrani Ahmed Alghamdi Department of Computer Science Superior UniversityLahore54000Pakistan Department of Informatics&Systems University of Management&TechnologyLahore54000Pakistan Department of Software Engineering Superior UniversityLahore54000Pakistan Faculty of Computer Science&Information Technology Superior UniversityLahore54000Pakistan Department of Computer Science&Artificial Intelligence College of Computer Science&EngineeringUniversity of JeddahJeddah21493Saudi Arabia Department of Software Engineering College of Computer Science and EngineeringUniversity of JeddahJeddah21493Saudi Arabia
The conventional Close circuit television(CCTV)cameras-based surveillance and control systems require human resource *** all the criminal activities take place using weapons mostly a handheld gun,revolver,pistol,sword... 详细信息
来源: 评论
Secure-by-Construction Synthesis for Control systems
收藏 引用
IEEE Transactions on Automatic Control 2025年 第6期70卷 4170-4177页
作者: Zhong, Bingzhuo Liu, Siyuan Caccamo, Marco Zamani, Majid Thrust of Artificial Intelligence Information Hub The Thrust of Intelligent Transportation System Hub China KTH Royal Institute of Technology Division of Decision and Control Systems Stockholm Sweden Technical University of Munich TUM School of Engineering and Design Germany University of Colorado Boulder Department of Computer Science United States Ludwig Maximilian University Department of Computer Science Munich Germany
In this note, we present the synthesis of secure-by-construction controllers that address safety and security properties simultaneously in cyber-physical systems. Our focus is on studying a specific security property ... 详细信息
来源: 评论
Towards efficient generative AI and beyond-AI computing:New trends on ISSCC 2024 machine learning accelerators
收藏 引用
Journal of Semiconductors 2024年 第4期45卷 12-15页
作者: Bohan Yang Jia Chen Fengbin Tu Department of Electronic and Computer Engineering The Hong Kong University of Science and TechnologyHong KongChina AI Chip Center for Emerging Smart Systems The Hong Kong University of Science and TechnologyHong KongChina School of the Gifted Young University of Science and Technology of ChinaHefei 230026Chin
Compared to the last decade when the convolution neu-ral network(CNN)dominated the research field,machine learn-ing(ML)algorithms have reached a pivotal moment called the generative artificial intelligence(AI)*** the ... 详细信息
来源: 评论
A Single DC-source Asymmetrical Multilevel Inverter With Solid State Transformer With New Switching Approach
A Single DC-source Asymmetrical Multilevel Inverter With Sol...
收藏 引用
2024 International Conference on Recent Innovation in Smart and Sustainable Technology, ICRISST 2024
作者: Karunakaran, E. Suresh, Y. Rao, Bhukya Nageswar Vivek, P.S.S. Aditya, K. National Institute of Technology Department of Electrical and Electronics Engineering Karnataka Surathkal India Kolhapur Institute of Technology College of Engineering Department of Computer Science and Business Systems Kolhapur India
Cascaded H-bridge (CHB) MLI have emerged as the preferred choice due to their high quality in output waveforms with low harmonic distortion. However, a key limitation in these inverters lies in the requirement of a de... 详细信息
来源: 评论
Improving Breast Cancer Diagnosis through Multi-Class Segmentation using Attention UNet Model  2
Improving Breast Cancer Diagnosis through Multi-Class Segmen...
收藏 引用
2nd IEEE International Conference on Advances in Information Technology, ICAIT 2024
作者: Ghantasala, G.S. Pradeep Unhelkar, Bhuvan Chakrabarti, Prasun Vidyullatha, Pellakuri Pyla, Meghana Department of Information Systems and Decision Sciences Muma College of Business University of South Florida South Florida United States Department of Computer Science and Engineering Alliance College of Engineering and Design Alliance University Bengaluru India Department of Computer Science and Engineering Sir Padampat Singhania University Rajasthan Udaipur India Department of Computer Science and Engineering Koneru Lakshmaiah Education Foundation Vaddeswaram Andhra Pradesh Guntur India
One of the prominent causes of death for women universally is breast cancer. The number of early deaths is reduced with early detection. Using an ultrasound scan, the data examine the ultrasound images of breast cance... 详细信息
来源: 评论
A Simulation-based Education Platform for Security Investments Through Culture and Knowledge Convergence  18
A Simulation-based Education Platform for Security Investmen...
收藏 引用
18th European Conference on Games Based Learning, ECGBL 2024
作者: Filippidis, Adam P. Hilas, Constantinos S. Politis, Anastasios Rantos, Konstantinos Mouratidis, Haralambos Department of Computer Informatics and Telecommunications Engineering International Hellenic University Serres Campus Serres Greece Department of Computer Science Democritus University of Thrace Kavala Campus Greece Department of Computer and Systems Sciences Stockholm University Sweden
Cybersecurity is one of the most critical sectors of information systems and is considered a strategic priority for many Organizations. Information security investments are a crucial aspect of cybersecurity. However, ... 详细信息
来源: 评论
Drone-Based Public Surveillance Using 3D Point Clouds and Neuro-Fuzzy Classifier
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 4759-4776页
作者: Yawar Abbas Aisha Ahmed Alarfaj Ebtisam Abdullah Alabdulqader Asaad Algarni Ahmad Jalal Hui Liu Faculty of Computing and AI Air UniversityIslamabad44000Pakistan Department of Information Systems College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia Department of Information Technology College of Computer and Information SciencesKing Saud UniversityRiyadh12372Saudi Arabia Department of Computer Sciences Faculty of Computing and Information TechnologyNorthern Border UniversityRafha91911Saudi Arabia Department of Computer Science and Engineering College of InformaticsKorea UniversitySeoul02841Republic of Korea Cognitive Systems Lab University of BremenBremen28359Germany
Human Activity Recognition(HAR)in drone-captured videos has become popular because of the interest in various fields such as video surveillance,sports analysis,and human-robot ***,recognizing actions from such videos ... 详细信息
来源: 评论
Advanced Brain Tumor Segmentation Using UNet and Multiple Residual Networks  2
Advanced Brain Tumor Segmentation Using UNet and Multiple Re...
收藏 引用
2nd IEEE International Conference on Networking and Communications, ICNWC 2024
作者: Ramya, D. Manigandan, S.K. Velmurugan, J. Vishnukumar, A. Umarani, V. Reddy, P. V. Sai Ram Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Department of Information Technology Chennai India Vel Tech High Tech Dr.Rangarajan Dr.Sakunthala Engineering College Department of Information Technology Chennai India Saveetha School of Engineering Department of Computer Science and Engineering Chennai India Rajalakshmi Engineering College Department of Computer Science and Business Systems Chennai India Saveetha Engineering College Department of Computer Science and Engineering Chennai India
Accurate brain tumors segmentation is essential for precise diagnosis, planning, treatment, and monitoring of the tumor. However, the variations in tumor size, shape, and location, automating this process can be chall... 详细信息
来源: 评论
Strengthening Authentication: The Role of Multi-Level Hashing in OSPA Protocol  5
Strengthening Authentication: The Role of Multi-Level Hashin...
收藏 引用
5th International Conference on IoT Based Control Networks and Intelligent systems, ICICNIS 2024
作者: Hariharasudhan, S. Varghese, Vineetha Malarvizhi, K. Santhoshkumar, S.P. Nalini, T. Vikram, D. Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology Department of Computer Science and Engineering Chennai Avadi India Rathinam Technical Campus Department of Computer Science and Engineering Coimbatore India Jct College of Engineering and Technology Department of Computer Science Al Business Systems Coimbatore India Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology School of Computing Department of Computer Science and Engineering Chennai Avadi India Saveetha Institute of Medical and Technical Sciences Saveetha School of Engineering Saveetha University Department of Computer Science and Engineering Chennai India Rathinam Technical Campus Department of Artificial Intelligence Data Science Coimbatore India
Authentication is a crucial step in the cyber security process that confirms user identities. Even though they are widely used, traditional password based techniques are frequently vulnerable to attacks like guessing ... 详细信息
来源: 评论
Arduino Uno Programming based New Five Level Inverter for Photovoltaic Applications  2
Arduino Uno Programming based New Five Level Inverter for Ph...
收藏 引用
2nd IEEE International Conference on Futuristic Technologies, INCOFT 2023
作者: Rao, Bhukya Nageswar Hake, Ashok Shrimant Chavan, Vishal Subhash Hadimani, Lingaraj Kolhapur Institute of Technology College of Engineering Department of Computer Science and Business Systems Maharashtra Kolhapur India
This article presents a novel five-level transformer-based inverter with inherent boosting abilities specially designed for photovoltaic applications. The key distinction of this proposed inverter lies in its three-le... 详细信息
来源: 评论